If you have the same vlan that exists on two switches that are connected together, do you need a source port for the span on both switches or will a port on one of the switches collect all traffic for that vlan?
If you're going to cross switches by trying to capture traffic on 1 switch to a destination port on the other switch, you need to use RSPAN to do it. Normal SPAN will have a source/destination port on a single switch and RSPAN uses a special vlan to carry your monitored information over. Otherwise, you'd set your source port on your primary switch and you can collect information for all ports in a certain vlan, and make your destination the RSPAN vlan. On the other switch, you'd make your source your RSPAN vlan and then your destination port is whatever port your monitoring device is configured on.
Thanks John, however i think perhaps i didnt make it clear what i mean. On the other hand perhaps i just havent understood.
I am asking whether the vlan that is on both switches will be all captured by monitoring the vlan on one switch, so is all the traffic for the vlan captured by specifying 'vlan' on one switch - is one switch cogniscent of all the vlan traffic even though it exists on the other directly connected switch?
Even if you have a single vlan trunked across 2 switches, you'll only be able to capture traffic on the single switch unless you're using rspan. You won't be able to see the vlan, even though the same, on the other switch.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...